mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 17:58:52 +00:00
47 lines
1.1 KiB
YAML
47 lines
1.1 KiB
YAML
|
action: global
|
||
|
title: Suspicious PrinterPorts Created
|
||
|
id: 7ec912f2-5175-4868-b811-ec13ad0f8567
|
||
|
status: experimental
|
||
|
description: Detects new registry printer port was created or powershell command add new printer port which point to suspicious file
|
||
|
author: EagleEye Team, Florian Roth
|
||
|
date: 2020/05/13
|
||
|
modified: 2020/05/15
|
||
|
references:
|
||
|
- https://windows-internals.com/printdemon-cve-2020-1048/
|
||
|
tags:
|
||
|
- attack.persistence
|
||
|
- attack.execution
|
||
|
detection:
|
||
|
condition: 1 of them
|
||
|
falsepositives:
|
||
|
- New printer port install on host
|
||
|
level: high
|
||
|
---
|
||
|
logsource:
|
||
|
service: sysmon
|
||
|
product: windows
|
||
|
detection:
|
||
|
selection:
|
||
|
EventID:
|
||
|
- 12
|
||
|
- 13
|
||
|
TargetObject|startswith: 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Ports'
|
||
|
EventType: CreateKey
|
||
|
TargetObject|contains:
|
||
|
- '.dll'
|
||
|
- '.exe'
|
||
|
- 'C:'
|
||
|
---
|
||
|
logsource:
|
||
|
category: process_creation
|
||
|
product: windows
|
||
|
detection:
|
||
|
selection1:
|
||
|
CommandLine|contains: 'Add-PrinterPort -Name'
|
||
|
selection2:
|
||
|
CommandLine|contains:
|
||
|
- '.dll'
|
||
|
- '.exe'
|
||
|
|
||
|
|